CVE-2025-63889

fetch · fetch Multiple Products

A high-severity vulnerability has been identified in multiple products from the vendor "fetch," specifically within a core template-rendering function.

Executive summary

A high-severity vulnerability has been identified in multiple products from the vendor "fetch," specifically within a core template-rendering function. This flaw could allow a remote, unauthenticated attacker to read sensitive files from the server or potentially execute arbitrary code, leading to a full system compromise. Immediate patching is required to prevent potential data breaches and unauthorized access to critical infrastructure.

Vulnerability

The vulnerability exists in the fetch function within the think\Template library, a component associated with the ThinkPHP framework. This function is responsible for parsing and rendering template files. An attacker can exploit this vulnerability by providing a specially crafted input that manipulates the file path passed to the fetch function. This could allow for path traversal, enabling the attacker to force the application to read and display the contents of arbitrary files on the server, such as configuration files containing credentials or sensitive system files (Local File Inclusion - LFI). Depending on the server configuration and the capabilities of the template engine, this flaw could also be escalated to achieve Remote Code Execution (RCE) if an attacker can trick the engine into parsing a malicious file they control.

Business impact

This is a High severity vulnerability with a CVSS score of 7.5. Successful exploitation could have a significant negative impact on the business. An attacker could exfiltrate sensitive data, including customer information, intellectual property, and internal credentials, leading to severe data breaches, regulatory fines, and reputational damage. If Remote Code Execution is achieved, the attacker could gain complete control over the affected server, using it to pivot further into the network, deploy ransomware, or disrupt business operations entirely.

Remediation

Immediate Action: Apply vendor-provided security updates immediately to all affected systems. Prioritize patching for internet-facing applications. Following the update, implement continuous monitoring for any indicators of compromise and thoroughly review web server and application access logs for unusual file access patterns or suspicious requests made prior to patching.

Proactive Monitoring: Security teams should actively monitor for exploitation attempts. Look for path traversal sequences (e.g., ../, ..%2f) in URL parameters and POST data within web server access logs. Monitor application error logs for failed file-open or include/require attempts. Network monitoring should be in place to detect anomalous outbound connections from web servers, which could indicate a successful compromise.

Compensating Controls: If immediate patching is not feasible, implement a Web Application Firewall (WAF) with rules designed to block path traversal and common template injection attacks. Enforce strict file permissions for the web server user account to limit its ability to read files outside of the web root directory. Ensure robust input validation is performed on all user-supplied data that could be passed to file or template rendering functions.

Exploitation status

Public Exploit Available: false

Analyst recommendation

CVE-2025-63889 represents a high-risk vulnerability that could allow for complete system compromise. Given the high severity score (CVSS 7.5) and the widespread use of the underlying framework, immediate action is critical. Although this vulnerability is not currently listed on the CISA Known Exploited Vulnerabilities (KEV) catalog, flaws of this nature are frequently added once widespread exploitation begins. Organizations are strongly advised to prioritize the deployment of the vendor's security updates across all affected systems and implement heightened monitoring to detect and respond to any potential exploitation attempts.